咨询与建议

限定检索结果

文献类型

  • 180 篇 会议
  • 73 册 图书

馆藏范围

  • 250 篇 电子文献
  • 6 种 纸本馆藏

日期分布

学科分类号

  • 118 篇 理学
    • 117 篇 数学
    • 19 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 1 篇 物理学
  • 112 篇 医学
    • 85 篇 特种医学
    • 54 篇 临床医学
    • 44 篇 医学技术(可授医学...
  • 58 篇 工学
    • 52 篇 计算机科学与技术...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
    • 1 篇 建筑学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...

主题

  • 35 篇 visualization
  • 22 篇 diffusion mri
  • 15 篇 image processing...
  • 14 篇 computer graphic...
  • 12 篇 magnetic resonan...
  • 11 篇 topology
  • 10 篇 tractography
  • 10 篇 diffusion
  • 9 篇 geometry
  • 8 篇 deep learning
  • 8 篇 artificial intel...
  • 6 篇 computational ma...
  • 6 篇 computational sc...
  • 6 篇 computer imaging...
  • 5 篇 mathematical and...
  • 5 篇 eye tracking
  • 5 篇 tensors
  • 5 篇 eye movements
  • 4 篇 simulation and m...
  • 4 篇 pattern recognit...

机构

  • 5 篇 university of ka...
  • 4 篇 univ pavia dept ...
  • 4 篇 univ cote dazur ...
  • 4 篇 northwestern pol...
  • 4 篇 univ n carolina ...
  • 4 篇 university colle...
  • 4 篇 univ n carolina ...
  • 3 篇 ucl ctr med imag...
  • 3 篇 linköping univer...
  • 3 篇 lawrence livermo...
  • 3 篇 zuse institute b...
  • 3 篇 university of ca...
  • 3 篇 univ verona comp...
  • 3 篇 inria sophia ant...
  • 3 篇 univ n carolina ...
  • 3 篇 wright state uni...
  • 3 篇 the university o...
  • 3 篇 univ n carolina ...
  • 3 篇 ecole polytech f...
  • 3 篇 therapanacea

作者

  • 10 篇 deriche rachid
  • 8 篇 yap pew-thian
  • 8 篇 hans hagen
  • 7 篇 hans-christian h...
  • 7 篇 shen dinggang
  • 6 篇 wassermann demia...
  • 6 篇 enrico kaden
  • 6 篇 chen geng
  • 6 篇 bernd hamann
  • 5 篇 jones derek k.
  • 5 篇 hamish carr
  • 5 篇 thompson paul m.
  • 5 篇 fick rutger
  • 5 篇 marco reisert
  • 5 篇 pizzolato marco
  • 5 篇 pascucci valerio
  • 5 篇 yogesh rathi
  • 4 篇 julien tierny
  • 4 篇 thiran jean-phil...
  • 4 篇 nir talia m.

语言

  • 244 篇 英文
  • 9 篇 中文
检索条件"丛书名=Mathematics and Visualization"
253 条 记 录,以下是181-190 订阅
排序:
Measuring the complexity of computer security visualization designs  1
收藏 引用
4th International Workshop on Computer Security
作者: Suo, X. Zhu, Y. Owen, G. Scott Georgia State Univ Dept Comp Sci Atlanta GA 30303 USA
We present a novel method to measure the complexity of computer security visualization designs. The complexity is measured in terms of visual integration, number of separable dimensions for each visual unit, the compl... 详细信息
来源: 评论
Intelligent classification and visualization of network scans  1
收藏 引用
4th International Workshop on Computer Security
作者: Muelder, C. Chen, L. Thomason, R. Ma, K. -L. Bartoletti, T. Univ Calif Davis Davis CA 95616 USA Lawrence Livermore Natl Lab Livermore CA USA
Network scans are a common first step in a network intrusion attempt. In order to gain information about a potential network intrusion, it is beneficial to analyze these network scans. Statistical methods such as wave... 详细信息
来源: 评论
Topology-based methods in visualization II  1
收藏 引用
丛书名: mathematics and visualization
2008年
作者: Hans-Christian Hege Konrad Polthier Gerik Scheuermann
visualization research aims at providing insights into large, complex bodies of data. Topological methods are distinguished by their solid mathematical foundation, guiding the algorithmic analysis and its presentation...
来源: 评论
Using InetVis to evaluate snort and bro scan detection on a network telescope  1
收藏 引用
4th International Workshop on Computer Security
作者: Irwin, B. van Riel, J. -P. Rhodes Univ ZA-6140 Grahamstown South Africa
This paper presents an investigative analysis of network scans and scan detection algorithms. Visualisation is employed to review network telescope traffic and identify incidents of scan activity. Some of the identifi... 详细信息
来源: 评论
Visual analysis of network flow data with timelines and event plots  1
收藏 引用
4th International Workshop on Computer Security
作者: Phan, D. Gerth, J. Lee, M. Paepcke, A. Winograd, T. Stanford Univ Dept Comp Sci Stanford CA 94305 USA
This paper describes Isis, a system that uses progressive multiples of timelines and event plots to support the iterative investigation of intrusions by experienced analysts using network flow data. The visual represe... 详细信息
来源: 评论
Visually understanding jam resistant communication  1
收藏 引用
4th International Workshop on Computer Security
作者: Schweitzer, D. Baird, L. Bahn, W. USAF Acad Colorado Springs CO 80840 USA
The primary goal of information security is to ensure the confidentiality, integrity, authenticity, and availability of information. Availability is often relegated to a discussion of denial of service attacks on netw... 详细信息
来源: 评论
Visualizing network security events using compound glyphs from a service-oriented perspective  1
收藏 引用
4th International Workshop on Computer Security
作者: Pearlman, J. Rheingans, P. Univ Maryland Baltimore Cty Baltimore MD 21250 USA
Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and type of a network attack. Knowledge of su... 详细信息
来源: 评论
The real work of computer network defense analysts - The analysis roles and processes that transform network data into security situation awareness
收藏 引用
4th International Workshop on Computer Security
作者: D'Amico, A. Whitley, K. Secure Decisions Division of Applied Visions Inc. United States Department of Defense United States
This paper reports on investigations of how computer network defense (CND) analysts conduct their analysis on a day-to-day basis and discusses the implications of these cognitive requirements for designing effective C... 详细信息
来源: 评论
Integrated environment management for information operations testbeds  1
收藏 引用
4th International Workshop on Computer Security
作者: Yu, T. H. Fuller, B. W. Bannick, J. H. Rossey, L. M. Cunningham, R. K. MIT Lincoln Lab Lexington MA 02420 USA
Network testbeds are indispensable for developing and testing information operations (10) technologies. Lincoln Laboratory has been developing LARIAT to support 10 test design, development, and execution with high-fid... 详细信息
来源: 评论
Putting security in context: Visual correlation of network activity with real-world information  1
收藏 引用
4th International Workshop on Computer Security
作者: Pike, W. A. Scherrer, C. Zabriskie, S. Pacific NW Natl Lab Richland WA 99352 USA
To effectively identify and respond to cyber threats, computer security analysts must understand the scale, motivation, methods, source, and target of an attack. Central to developing this situational awareness is the... 详细信息
来源: 评论